23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Wu, Ni, Janecek, & Nordstad, 2007) raise a number of research issues associated<br />

with <strong>RFID</strong> <strong>in</strong>vestigations.<br />

Nevertheless, each of these references has guidance for research and<br />

specific details of small-device forensic techniques. The literature reviewed<br />

(Chapter 2) shows that research is lead<strong>in</strong>g towards knowledge of better system<br />

architectures and to improve best practice guidance knowledge for digital<br />

<strong>in</strong>vestigators (see Chapter 5; Section 5.3). The National Institute of Justice (NIJ)<br />

Report (2005) also cont<strong>in</strong>ues the theme by specify<strong>in</strong>g best forensic <strong>in</strong>vestigator<br />

practice for small devices – but does not report <strong>RFID</strong> chip practice. Therefore,<br />

this appears to be a gap <strong>in</strong> the current professional literature.<br />

1.2 MOTIVATION OF THE RESEARCH<br />

<strong>RFID</strong> tags are used <strong>in</strong> the commercial retail sector for stock management<br />

(Chalasani, Boppana, & Sounderpandian, 2005). A tag is attached to a SI so that<br />

the identity of the SI is accessible by digital scann<strong>in</strong>g. The cost advantage is<br />

apparent <strong>in</strong> various stock management processes <strong>in</strong>clud<strong>in</strong>g audit, transaction, and<br />

entry (for example <strong>in</strong> a book shop the contents of a carton may be <strong>in</strong>dividually<br />

scanned and data matched without open<strong>in</strong>g a carton). However, the risk of<br />

fraudulent exploitation of <strong>RFID</strong> stock management systems escalates when more<br />

expensive tags are used (usually on more expensive SI). The higher risk tags are<br />

read/write and/or active. The appetite for risk also escalates with higher valued SI<br />

and the parallel <strong>in</strong>crease <strong>in</strong> opportunity to crack a system. The utility value to the<br />

retailer of <strong>RFID</strong> tags is transaction efficiency and <strong>in</strong>ventory control but the trade-<br />

off is trust <strong>in</strong> the system. The violation of trust may occur <strong>in</strong> many ways and be<br />

demonstrated by educated theft of property. The residual risk of system violation<br />

requires a forensic read<strong>in</strong>ess capability that can <strong>in</strong>form the system security<br />

module on how best to treat a risk. In addition, the evidence requires identification,<br />

preservation, and analysis so that perpetrators may be prosecuted. The retailer has<br />

balanced a cost-benefit analysis to <strong>in</strong>vest <strong>in</strong> such a stock management system but<br />

may not realized the forecasted benefits <strong>in</strong> the event of negative control risks<br />

materializ<strong>in</strong>g (Altschaffel, Kiltz, & Dittmann, 2009).<br />

The research <strong>in</strong>terest <strong>in</strong> this project is to scope the risk of violation <strong>in</strong> a<br />

<strong>RFID</strong> stock management system (the Bus<strong>in</strong>ess System), to document the location<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!